article thumbnail

Release of Quantum Information Science and Technology White Paper

National Archives Records Express

We are pleased to announce the release of a white paper on the records management implications of Quantum Information Science and Technology (QIST). This is the third in a series of white papers—the first one being Blockchain (2019) and the second Cognitive Technologies (2020).

Paper 98
article thumbnail

Kr00k Wi-Fi Encryption flaw affects more than a billion devices

Security Affairs

This serious flaw, assigned CVE-2019-15126, causes vulnerable devices to use an all-zero encryption key to encrypt part of the user’s communication.” ” reads the paper published by ESET. Researchers pointed out that communications protected by TLS cannot be recovered by exploiting this vulnerability.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

LC4: Another Pen-and-Paper Cipher

Schneier on Security

LC4 is intended for encrypted communication between humans only, and therefore it encrypts and decrypts plaintexts and ciphertexts consisting only of the English letters A through Z plus a few other characters. LC4 performs authenticated encryption, and optional header data can be included in the authentication.

Paper 60
article thumbnail

Security Risks of Client-Side Scanning

Schneier on Security

The idea is that they wouldn’t touch the cryptography, but instead eavesdrop on communications and systems before encryption or after decryption. I’m part of a group of cryptographers that has just published a paper discussing the security risks of such a system. (It’s It means I don’t have to.)

Risk 131
article thumbnail

Yet Another FBI Proposal for Insecure Communications

Schneier on Security

Deputy Attorney General Rosenstein has given talks where he proposes that tech companies decrease their communications and device security for the benefit of the FBI. For example, many instant-messaging services now encrypt messages by default. Encryption serves a valuable purpose. I support strong and responsible encryption.

article thumbnail

The Various Aspects of Db2 for z/OS Data Encryption

Robert's Db2

Just last week, a person on the Db2 for z/OS team at an organization asked me for some guidance regarding data encryption in a Db2 context. The categories of Db2 for z/OS data encryption I will address herein are as follows: Application-transparent encryption of Db2 data "at rest" (i.e.,

article thumbnail

Decoupling for Security

Schneier on Security

This is an excerpt from a longer paper. To verify that decoupling has been done right, we can learn from how we think about encryption: you’ve encrypted properly if you’re comfortable sending your message with your adversary’s communications system. Here we outline a strategy for doing that.

Security 107